Besides the thorough discussion on SSH itself, one item to note if you
are using a BES internally, or presumably signed up with your provider's
BIS: according to tests we've done with the blackberries using 802.11
connectivity, you'll see an IPSEC tunnel to your provider for your voice
traffic, and
rom: [EMAIL PROTECTED]
> To: plug-discuss@lists.plug.phoenix.az.us
> Subject: Re: OT: Free OpenSource JAD/J2EE WAP SSH Client for Phones
>
> James Finstrom wrote:
> > Port knocking from a blackberry not overly realistic
> >
> Eh, could easily be done if you can
James Finstrom wrote:
> Port knocking from a blackberry not overly realistic
>
Eh, could easily be done if you can program your own java midlet to do so :)
-Charles
> On 11/25/08, James Mcphee <[EMAIL PROTECTED]> wrote:
>
>> Port knocking?
>> http://www.portknocking.org/
>>
---
Port knocking from a blackberry not overly realistic
On 11/25/08, James Mcphee <[EMAIL PROTECTED]> wrote:
> Port knocking?
> http://www.portknocking.org/
>
> --
> James McPhee
> [EMAIL PROTECTED]
>
--
Sent from my mobile device
James Finstrom
Rhino Equipment Corp.
http://rhinoequipment.com ~ ht
Port knocking?
http://www.portknocking.org/
--
James McPhee
[EMAIL PROTECTED]
---
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/l
Lisa Kachold wrote:
He's going to be stuck between usability and security with a two tierd
approach? Plus we have not even started to dissect the web SSL/Apache
exploits (which is another HUGE subject)!
Very true, but I'd almost rather have a second layer of auth than to
allow an entire class
25 Nov 2008 17:13:28 -0700
> From: [EMAIL PROTECTED]
> To: plug-discuss@lists.plug.phoenix.az.us
> Subject: Re: OT: Free OpenSource JAD/J2EE WAP SSH Client for Phones
>
> James Finstrom wrote:
> > On the original note, locking down to white listed IP addresses... I
> > ha
James Finstrom wrote:
> On the original note, locking down to white listed IP addresses... I
> have a blackberry through AT&T over their EDGE network and not through
> BES. I get a new IP every connection. I thought a compromise between
> "wide-open come have your way with me" and "no soup for y
On the original note, locking down to white listed IP addresses... I have a
blackberry through AT&T over their EDGE network and not through BES. I get a
new IP every connection. I thought a compromise between "wide-open come have
your way with me" and "no soup for you" would be to allow a subnet. W
osis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
http://www.urbandictionary.com/define.php?term=obnosis (503)754-4452
Catch the January PLUG HackFest! Kristy Westphal, CSO for the Arizona
Department of Economic
Security will provide a one hour
presentation on forensics.
From: [EMAIL PROT
SSH ensures security from IP to IP, not necessarily from Cell phone to
IP. So your 'endpoint' is the IP address on the cell providers systems.
The level of explicit security in this case is pretty low and would depend
on transport security inherit in the cell network protocol.
-jmz
On Tue, N
SSH is secured at your endpoint specifically because you don't trust
the network. Even if someone was able to intercept the cellular data
(which is encrypted as well, at least for GSM) they still wouldn't be
able to decypher your SSH session.
Sent from my iPhone
On Nov 25, 2008, at 2:38 PM
Lisa,
I wonder if the data transport (over cell network) is secured... can a
sophisticated cell phone eavesdropper snoop on my ssh session?
-jmz
On Tue, Nov 25, 2008 at 11:07 AM, Lisa Kachold <[EMAIL PROTECTED]>wrote:
> Check out midpssh - works on BlackBerry, and most PDA's - since it's
Tuna wrote:
> And just so I don't deviate too much from the topic, what purpose,
> exactly, would this serve? Does anybody have some story of how this has
> actually come in handy once? If so, do tell!
As I mentioned I was once in a movie theatre, and the previews had just
started and I got page
Lisa is like the caring mother of the PLUG list offering great advice
such as...
> Remember to limit your server SSH access points (where possible) through
> ACL [iptables] by IP [check your phone settings for IP address], use
> strong passwords, and deploy daemon wrappers like SSHIT or SSHUTOU
Check out midpssh - works on BlackBerry, and most PDA's - since it's compiled
for various ARM and other phone devices.
http://www.xk72.com/midpssh/
Point your phone browser to install:
http://xk72.com/wap
Security Disclaimer:
Remember to limit your server SSH access points (where possible) th
16 matches
Mail list logo